Ipad in the Enterprise Introduction

Total Page:16

File Type:pdf, Size:1020Kb

Ipad in the Enterprise Introduction 5 Things You Need to Know About iPad in the Enterprise Introduction Without a doubt, iPads are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry Birds. These tablets, with an entirely new browsing and usability paradigm, are rapidly making inroads into the enterprise, being tested, according to Apple, by more than 80 percent of the Fortune 100.i Aside from direct acquisition of the devices by the enterprises themselves, end-users are bringing them to work and using them in a variety of ways, intent on increasing productivity and making their work lives—and their personal lives—more efcient through easily accessible information away from a computer. While iPad presents the potential to bring a wealth of measurable and protable benets to the enterprise as well as happier, and, hence, more productive employees, it also brings a number of challenges and risks that threaten to lead to security breaches and compliance violations, regardless of industry. In this white paper, we’ll the discuss the top 5 Things you NEED to know about iPad and integrating them into an enterprise environment so you can protect and maximize existing IT and corporate assets, mitigate security and compliance risks, and keep IT in control, all while ensuring employees are happy and at their most productive. 1. iPads are Already in the “Mobile devices are quickly becoming our Enterprise (like it or not) primary computers…And tablets…are widely seen as potentially replacing the With or without IT’s blessing, iPad users are using their personal computer.”ii devices for work purposes (95% of employees say they – Fred Vogelstein, Wired, May 2011 use personally purchased devices for work use).iii That Forget whether you believe tablets and smartphones will replace means without a native le system on the device and the PC. Whether tablets like iPad settle in as an accessory or a enterprise security and management capability, users are replacement for the PC, tablets are not going away and are employing the “work around,” putting the enterprise and becoming a crucial port of productivity for enterprise workers as its assets at risk and compromising compliance efforts. well as consumers. Even if your company institutes a “no tablet” policy, it’s virtually impossible to keep employees from bringing their own devices to work—and coming up with their own ways to access les. End-users are forced to either email themselves a le or utilize unsecure environments from consumer-based cloud providers like DropBox to store and access les on iPad. That means uploading corporate data to an unsecure environment, then downloading it onto an iPad, viewing and/or saving it in third-party apps that are unsanctioned, inaccessible and unmanaged by IT, equating to a massive security risk. Enterprises that directly acquire iPads for task workers, intent on deploying enterprise productivity applications on the device from sales force automation to eld service, face the same issue as those contending with employees bringing their own devices into the workplace. Whether you’re an enterprise embracing the consumerization of IT and hearing from C-level executives on down that you need to support the iPad for business use, or you are looking at the iPad to deploy specic workforce applications to select employees, you’re probably acutely aware of the need to ensure secure access to critical enterprise information—and to lock down the device if it poses a threat to your organization’s critical information. The key is to address it upfront with the right solutions. 2 iPad Enterprise Adoption Facts • 15M iPads sold by the end of 2010 (Apple) • 7.33 million iPads sold in Q4 2010 (Apple) • More than 80% of Fortune 100deploying or testing iPads (Apple) • More than 500 of the 11,000-plus applications built specifically for the iPad are in the business category (WSJ) Fact: 95% of consumer-purchased devices are used for work (Unisys) 2. Lack of Native File System and Centralized Storage iPad introduces a completely new user mode and browsing experience. A revolutionary UI and paradigm shift in computing usability results in a new way of handling and interacting with les. On iPad, les must either be created on device or transferred to it via individual applications. This poses a game-changing paradigm shift in the way users are accustomed to accessing, editing and transferring les between devices and corporate le servers. iPad does not come with a user accessible le system. When iPad is connected to a computer, it can sync music, videos, and apps through iTunes, but a user can’t personally copy les over to the device the way they would to a PC’s ash drive or other mobile device. iPad provides a way to search the user’s music, video, apps, contacts, etc. but does not allow the user to browse or search the actual les stored on the device. iPads also don’t have a way to centrally store les anywhere on the device—most applications are universes unto themselves, and maintain their own le storage systems that can only be accessed via that individual app. There are a few consumer-based applications, like readers and editing-based applications that allow application-related les to be opened in another application. When this is done, the le is copied to that app’s private storage area and then exists in two places on the iPad – multiplying versions. That means the unsecure “work-arounds” are required, putting condential and critical les, enterprises have spent years, time and money creating, at risk. 3. No built-in access to corporate le servers Out of the box, iPad is designed to receive les from iTunes syncing and through consumer cloud-based services like Apple’s MobileMe. Unlike a Mac or PC, the iPad has no built-in ability to connect directly to a corporate le server, the hub of information for productivity and knowledge-sharing essential to people doing their jobs, regardless of what line of business or job function. Again, the most popular “work-arounds,” present a security risk to the enterprise as there is no way to ensure consumer and cloud-based le storage services are transferring—and storing—les under the heightened encryption and password-protection required by most enterprises to ensure asset protection, mitigated risk and compliance. 3 4. Mobile device management provides no capabilities for managing individual applications While some mobile device management (MDM) solutions allow for the provisioning, tracking and remote management of the device as a whole and for specic sanctioned mobile applications to the device, all enterprise applications are accessed through an on-device sandbox provided by the MDM vendor. Typically, within that sandbox are enterprise-focused, often custom-developed applications like eld service, asset management, time tracking, sales force automation, email and PIM, etc. If corporate documents are part of the predetermined enterprise application workow such as an installation manual required by a eld service rep, or access to equipment history for a technician, those documents are secure and can be locked down within the sandbox. However, once the user exits the MDM sandbox, the device user still cannot access enterprise les that exist on the standard corporate le servers, which may be required for other tasks outside of the predetermined workow of the task-focused application. In an effort to solve that problem, again, end-users turn to unsecure third-party cloud providers to gain access to corporate les on iPad. Once a user has installed a le-sharing app and moved corporate data into it, that data is almost certainly being stored unencrypted—whether on-device or in the cloud—and is outside of corporate control. The only way to remove that data is to wipe the entire device. What is required to maintain IT control of corporate les is to take advantage of Mobile File Management (MFM) solutions that can address the security requirements of today’s enterprise, which include: On-device search, access, browse and view features which simply place a le browsing and storage system on iPad that is natively lacking for enterprise use; Rapidly deployable server-based software, installable on leading le servers; Centralized server and client management tools designed specically for IT that allow rapid deployment and conguration of client and server deployments; On-device le encryption; Secure transfer of les through direct, encrypted connections between le servers and the device; Remote wipe capability that is application-specic to MFM; Direct integration with Active Directory for extending security protocols and permissions direct to iPad. 4 interactions between divergent operating platforms within the enterprise such as Macintosh computers and Window-based servers. When considering the products available to help securely integrate iPads into the enterprise while allowing users to File access on-device is password-protected Security standards are met for data transfer between server and device through over-the-wire encryption Access is controlled using corporate user accounts (aka Active Directory accounts) requirements The device can be remotely wiped of sensitive corporate data in the event the device is lost or stolen Conclusion iPad is making inroads into the enterprise – and its rapid adoption and popularity make it a key productivity enhancer for every worker as mobile employees become the norm, including executives, task workers and knowledge workers. However, its Until iPad is equipped with the Mobile File Management—its rapidly increasing presence in the enterprise presents a bigger and Active Directory and easily managed by central IT departments. Only then will the enterprise be able to truly unlock the power of iPad as business continues to grow more mobile.
Recommended publications
  • Mobile First: Securing Information Sprawl
    Mobile First: Securing Information Sprawl January 2014 Contents: Introduction: Addressing Information Sprawl – The Next Mobile First Challenge 2 1. Mobile First Platform: About Enterprise Mobility Management 4 2. Getting Down to Business: Managing Applications and Content 6 3. Identifying the Right Mobile Content Management Partner 7 4. Securing Information Sprawl Efficiently, Without Compromise 10 5. Designing your solution 11 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 References 15 Fax +1.650.919.8006 [email protected] 1 COPYRIGHT © 2014 MOBILEIRON. ALL RIGHTS RESERVED. Introduction: Addressing Information Sprawl – The Next Mobile First Challenge In a recent survey, “The Mobile Trust Gap,” MobileIron reported that of the 3000 respondents, 80% claimed they are using personal smartphones and tablets for work. In November 2013, 451 Research reported that 41% of enterprises increased spending on Mobile Device Management (MDM) in 2013, with 46% planning to do so in 2014. It’s clear; the question is no longer if but rather when and how businesses will bring mobile devices under management. (For a detailed discussion of how to support a multi-OS mobile device environment, please see our whitepaper: Simplifying the move from BlackBerry to Multi-OS.) So you’ve secured the device. What about the content? Once you have implemented mobile device management (MDM), the next mobile problem to address is information sprawl. Because they increasingly want access to more than just email, business users are taking advantage of the sharing and access capabilities of consumer mobile devices, including app-based cloud services. Workers now use smartphones and tablets as their primary computing endpoints and have high expectations for mobile collaboration capabilities.
    [Show full text]
  • Apps Para Empresas Guía De Primeros Pasos Descubre Apps | Compra Apps | Distribuye Apps | Apps En Acción | Recursos Adicionales
    Apps para empresas Guía de primeros pasos Descubre apps | Compra apps | Distribuye apps | Apps en acción | Recursos adicionales Contenido Miles de apps para el iPad y el iPhone ya están ofreciendo prestaciones revolucionarias que transforman la manera de trabajar de los empleados. El propósito de esta guía es ayudarte a descubrir y seleccionar las apps que pueden aumentar la productividad en tu empresa. También incluye información sobre las opciones para comprar y distribuir apps. Descubre apps 3 Apps en acción 21 Identifica apps para el iPad y Averigua cómo usan las apps otras el iPhone que se adaptan a las empresas para cambiar su forma de necesidades de tu empresa. trabajar. Compra apps 15 Recursos 24 Infórmate sobre las opciones Obtén más información mediante para comprar apps para tu empresa. recursos online. Distribución de aplicaciones 19 Encuentra la mejor forma de distribuir las apps entre tus empleados. Apps para empresas Guía de primeros pasos 2 Descubre apps | Compra apps | Distribuye apps | Apps en acción | Recursos adicionales Descubre apps Explora las siguientes categorías para conocer algunas de las mejores apps para empresas y descubrir las más adecuadas para tus necesidades. Acceso a archivos Gestión de clientes Edición de documentos Análisis de informes Creación de formularios Lluvias de ideas Colaboración Presentaciones Toma de notas Gestión de viajes y gastos Seguimiento, facturación y ventas Consejo rápido Diseñada para el iPad y el iPhone iPad l iPhone Versiones distintas para el iPad y el iPhone Descubre apps | Compra apps | Distribuye apps | Apps en acción | Recursos adicionales Acceso a archivos Cuando estés fuera de la oficina, usa apps para descargar archivos desde un equipo de mesa, un servicio alojado online o un sistema de gestión de contenido corporativo.
    [Show full text]
  • Organisation Name
    Organisation Name Domain Askern Medical Practice The White Wings Centre Spa Pool Road, Askern Doncaster, S-Yorkshire DN6 0HZ askernmedicalpractice.nhs.uk Buckinghamshire County Council sexualhealthbucks.nhs.uk Gloucestershire Care Services hopehouse.nhs.uk Orchard Family Practice Rainham Healthy Living Centre 103-107 High Street Rainham Kent, ME8 8AA Orchardfamilypractice.nhs.uk Orchard Family Practice Rainham Healthy Living Centre 103-107 High Street Rainham Kent, ME8 8AA orchardfamilypracticerainham.nhs.uk St Clements Surgery GP practice D82105 St Clements Surgery 105 Churchgate Way Terrington St Clements Kings Lynn Norfolk PE344LZ stclementssurgery.nhs.uk St Johns Way Medical Centre 96 St. John's Way Archway London N19 3RN stjohnsway.nhs.uk. The Flying Scotsman Health Centre The Flying Scotsman Health Centre St. Sepulchre Gate West Doncaster DN1 3AP heflyingscotsmanhealthcentre nhs.uk The Practice Lincoln Green The Practice Lincoln Green Burmantofts Health Centre Lincoln Green Leeds LS9 7TA hepracticelincolngreen.nhs.uk University Hospitals of North Midlands NHS Trust (Name change fro: University Hospital Of North Staffordshire NHS Trust) myipfcheck.uhns.nhs.uk University Hospitals of North Midlands NHS Trust (Name change fro: University Hospital Of North Staffordshire NHS Trust) uhnm.nhs.uk University Hospitals of North Midlands NHS Trust (Name change fro: University Hospital Of North Staffordshire NHS Trust) uhnmdawn.uhns.nhs.uk University Hospitals of North Midlands NHS Trust (Name change fro: University Hospital Of North Staffordshire
    [Show full text]
  • Mobilecho® Overview
    OVERVIEW mobilEcho® Overview Secure Mobile File Management for Enterprise Mobility Users mobilEcho® enables enterprise IT to provide mobile users with secure access mobilEcho Benefits to enterprise file servers and SharePoint files, eliminating the headaches of employees using unsafe and non-compliant alternatives such as consumer-based services and applications. Key features: • Simple for the end-user; no mobilEcho ensures that all corporate files and assets can be securely accessed training required by the right people. mobilEcho drives business value in several ways, including: • Centralized Management • Enterprise Security • Mitigated Risk: mobilEcho ensures mobile file access adheres to your • Secure PDF Annotation corporate security policies and files are properly protected. • Two-way sync and offline file • Regulatory Compliance: mobilEcho helps organizations meet compliance access regulations regarding data and file access. This eliminates costly fines and embarrassing PR exposure. Empower Your Mobile Employees: • Reduced IT Management Cost: mobilEcho provides simple yet comprehensive • Senior Executives on-the-go tools for your IT team to ensure they meet their security, compliance and enabled to make quick management objectives in a cost-effective manner. decisions with anytime, anywhere access • Improved Employee Productivity: Mobile devices allow greater access • Sales Executives in front of to information which can improve decision-making, increase customer customers are speeding up satisfaction, and improve profitability. mobilEcho allows enterprises to the sales process with instant support both corporate-owned and employee-owned devices. access to collaterals • Field Service Workers have • Competitive Differentiation: Meet security needs and arm your employees secure access to critical docs, with the devices they want and need to better complete their tasks and meet improving productivity and SLA operational objectives that set you apart from competitors.
    [Show full text]
  • Leading Green Institution Employs Mobilecho® to Reduce Waste and Streamline Productivity for Senior Staff
    SUCCESS STORY Leading Green Institution Employs mobilEcho® to Reduce Waste and Streamline Productivity for Senior Staff “mobilEcho is revolutionary in the way that it enables the iPad, which was originally designed as a non-corporate product, to be used in a corporate landscape” Iain Reeman, ICT Systems Director at University of East Anglia Challenge: Key Challenges: Empower Staff to Leverage the iPad for File Access and Enable employees to leverage the iPad’s mobile More Efficient Workflow capabilities with easy access to corporate files on the university’s servers—without interfering with the In the spring of 2012, the University of East Anglia, a top-ranked university’s existing infrastructure or security standards. university in Norwich, U.K., purchazed iPads for members of some of the university’s senior management teams, in an effort to provide a Key Benefits: more efficient workflow and significantly reduce the amount of paper generated by department meetings. While the iPads made remote • mobilEcho gives employees the ability to easily email access and other browser-based tools easy enough, without on- access their files on the university server using device storage options, the university couldn’t offer employees a way their iPads without compromising university security and privacy protocols. to access files from the iPads® safely and securely. • No extra log-ins, passwords or applications are With a secure file service in place that did not support file access via required. mobile devices, the IT department simply needed to find a solution • Use of paper for the university’s senior staff has that would work within their existing infrastructure.
    [Show full text]
  • Grouplogic Introduces Mobilecho 4.0, Giving Access to Sharepoint Servers
    prMac: Publish Once, Broadcast the World :: http://prmac.com GroupLogic Introduces mobilEcho 4.0, Giving Access to SharePoint Servers Published on 07/31/12 GroupLogic, announces the latest version of its Mobile File Management solution, mobilEcho. mobilEcho client management improvements offer users more flexibility to edit and access files from the device of their choice. With mobilEcho 4.0, users now have access to corporate content via enterprise file servers, Network Attached Storage, and SharePoint. In addition to SharePoint integration, mobilEcho 4.0 also contains updates to client management and an administration console enhancement. Arlington, Virginia - GroupLogic(R), the industry's leading provider of software products that unlock the power of new enterprise platforms, announced today the latest version of its Mobile File Management (MFM) solution, mobilEcho. With mobilEcho 4.0, users now have access to corporate content via enterprise file servers, Network Attached Storage (NAS), and SharePoint. In addition to SharePoint integration, mobilEcho 4.0 also contains updates to client management and an administration console enhancement. "Enterprise investment in content and document management is continuing to grow, which means the use of corporate files and documents on smartphones and tablets is also increasing," said Chris Hazelton, research director, mobile & wireless, at 451 Research. "At the same time, it is necessary to keep these devices secure, especially when accessing and editing documents. Organizations need to marry the user's need for easy and convenient access to documents with the IT department's need to exhibit a level of control that ensures policies remain intact." "mobilEcho has enabled us to access documents from wherever our employees happen to be, changing how we do business and enabling us to work more efficiently," said Brandon Covert, director of information technology for the Cleveland Browns.
    [Show full text]
  • 451 Group 1 Context
    GroupLogic extends mobile sync support with new activEcho product Analyst: Chris Hazelton Kathleen Reidy 27 Mar, 2012 GroupLogic has released activEcho, which is aimed at the mobile file-sharing and -synchronization market (aka 'Dropbox for the enterprise'). The company intends to sell activEcho directly to IT departments and position it as an alternative to consumer- and SMB-oriented file-sharing and -sync services delivered from the public cloud. ActivEcho is a companion to the mobilEcho product that GroupLogic released in May 2011. MobilEcho enables file sharing and sync for tablets and other mobile devices, while activeEcho brings in support for desktops. Both products help IT gain control of data movement in the age of 'bring your own device' (BYOD). GroupLogic faces a number of potential competitors in this market, although none is yet well established with enterprise IT departments, which are now just beginning to find alternatives to the rampant use of consumer services by employees. The 451 Take Controlling the movement of data across devices in the enterprise has always been of paramount importance, but it has become increasingly difficult to deal with in the age of BYOD. As employees demand access to corporate data on any type and number of devices, at any time, mobile file sharing and synchronization becomes a key tool for tracking and managing the movement of a company's key data. GroupLogic is building on its history of supporting Apple devices in the enterprise to deliver its own enterprise-grade synchronization service. With enterprise computing going through significant changes in the types of devices and the manner in which data is stored, GroupLogic is well positioned.
    [Show full text]
  • Frequently Asked Questions
    Frequently Asked Questions What is mobilEcho? mobilEcho is the industry’s first Mobile File Management (MFM) software for enterprise IT and mobile device users. mobilEcho enables enterprises to provide mobile device users with secure access to enterprise file servers, SharePoint servers, and NAS storage, eliminating the need for workarounds and third-party mobile applications that compromise the security of enterprise files and assets. Configurable and deployable across the enterprise within minutes, mobilEcho promotes efficient IT Management while ensuring corporate security and compliance standards are met. Enterprise end-users of mobilEcho can access, browse, search and interact with corporate files as well as sync files for offline access, improving overall mobile worker productivity regardless of job function. Who uses mobilEcho? Any enterprise that needs to provide secure file access from mobile devices -- from the small and medium size businesses to Fortune 1000 companies. Who benefits from mobilEcho being deployed in the Enterprise? • Employees with mobile devices will prefer mobilEcho for its speedy browsing and lightning--fast search of file names and content, all of which can be remotely administered, making their out of the box experience instantly gratifying. • IT System Administrators will prefer mobilEcho for its centralized management and easy integration into existing Windows-based tools and processes. • Businesses will benefit from mobilEcho enabling greater productivity and satisfaction from their employees while ensuring the security and compliance policies of the corporation are met. What are the key features? • Access, Browse, Preview, Sync & Search Files on corporate file servers, SharePoint servers, and NAS Devices Same, seamless and secure file access as on a PC and from your iOS or Android mobile devices.
    [Show full text]
  • Enterprise Security with Mobilecho Enterprise Security from the Ground Up
    Enterprise Security with mobilEcho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the rst topics on the table. So it should come as no surprise that mobilEcho, GroupLogic’s Mobile File Management (MFM) product, was designed from the ground up to combine mobile le access with enterprise security. mobilEcho is the industry’s rst and only mobile MFM software for enterprise iPad users. mobilEcho enables enterprises to provide secure access to enterprise le servers for iPad users, eliminating the need for work-arounds and third-party mobile applications that compromise the security of corporate les and assets. Congurable and deployable across the enterprise within minutes, mobilEcho promotes ecient IT management while ensuring corporate security and compliance standards are met. Enterprise end-users of mobilEcho can access, browse, search and interact with corporate les as well as cache les for oine access, improving overall mobile worker productivity regardless of job function. Specic to security, mobilEcho takes into consideration three critical components that need to be secured when remotely accessing les from corporate servers: the server itself, the network and the mobile client. In addition, the various stakeholders - the end-user, the IT administrator, and the security team - each have dierent requirements. mobilEcho addresses each of them independently and collectively. This document describes how mobilEcho enables simple, secure and managed mobile le access. Security on the Server mobilEcho security starts on your corporate servers. Unlike consumer and cloud-based solutions for the iPad, mobilEcho allows the IT organization to stay in charge since your valuable business content and les remain on corporate-controlled servers.
    [Show full text]
  • Smart Card Authentication
    SMART CARD AUTHENTICATION Smart Card Authentication Secure CAC/PIV Mobile File Management Acronis mobilEcho® for iOS meets the needs of US DoD, Federal, State and Local governments and corporate iPhone and iPad users for simple and straightforward two-factor authenticated CAC, PIV, PIV-I and CIV smart card access to files. mobilEcho empowers employees who choose iPhones & iPads with secure, managed access to documents stored on enterprise storage including file servers, NAS such as NetApp, EMC or Isilon and SharePoint sites with built in editing for Microsoft Office files including Microsoft Word, Excel and PowerPoint. mobilEcho supports the common use of searching for a document on a server, opening and editing that document and saving the edited version back to the server, all from an iPhone or iPad. Authenticate to access files on: • Windows and any file servers accessible by SMB/CIFS • Microsoft SharePoint sites, including Office 365 hosted sites • Network Attached Storage (NAS) such as NetApp, Isilon, EMC and Western Digital Thursby Inside The Secure CAC/PIV technology is licensed from Thursby Software, Inc. The smart card technology is the same code used by the Pentagon, Army, Navy, White House, NIH and SEC across tens of thousands of Mac users since the mid 2000s. Smart Card Reader Support mobilEcho supports a variety of smart card readers including: • Thursby • Indentive iAuthenticate • Precise Biometrics Reader hardware and card are not included. Protecting the App When mobilEcho’s primary authentication is configured to use Smart Cards, the mobilEcho app will require that the user’s Smart Card is inserted into the reader before the user can use the app.
    [Show full text]
  • Acronis Access (Ios)
    ! Using Acronis Access with MobileIron March 6, 2014 Proprietary and Confidential Do Not Distribute Overview Bundle ID: com.grouplogic.mobilecho The Access Mobile Client provides iPad and iPhone devices with secure access to files located on Windows file servers, SharePoint servers, Access Sync & Share volumes, as well as 'network reshare' access to SMB/CIFS compatible file servers (i.e., NAS devices, remote Windows Servers, Linux file servers). Acronis Access servers can optionally control the mobile application's features and security settings by configuring user and/or group policies. The Access Mobile Client application can access files on one or many Acronis Access Gateway Servers. Files can be copied or synced from servers to on- device encrypted storage within the Access Mobile Client app. These files can then be accessed even if the mobile client does not have a Wi-Fi or 3G net- work connection. The mobile app has SmartOffice integrated, which allows files to be opened and edited within the Access Mobile Client. Files can also be opened in other mobile applications, moved, copied, printed, emailed, renamed or deleted. In addition, the Acronis Access iOS client application allows PDFs to be annotat- !ed directly within the app. App availability The Acronis Access mobile app is available in the Apple App Store: https:// itunes.apple.com/app/acronis-access/id429704844 Device compatibility Access Mobile Client Application Supported devices: ▪ Apple iPad 2nd, 3rd, 4th generation Company Confiden,al .1 ▪ Apple iPad Mini 1st, 2nd generation ▪ Apple iPad Air ▪ Apple iPhone 3GS, 4, 4S, 5, 5s, 5c ▪ Apple iPod Touch 4th, 5th generation Access Mobile Client Application Supported OS's: ▪ iOS 6 or later ! ! App-specific configuration The following keys can be used with the Acronis Access app: Key Description enrollmentServerNa The value of this key should be set to the DNS me address of the Acronis Access Gateway Server that the user will enroll with.
    [Show full text]
  • How to Wipe Company Data on Employees’
    How to Wipe Company Data on Employees’ Mobile Devices while Leaving Personal Data Alone; Interview with GroupLogic, Part V In this final installment of our interview series with GroupLogic we look at how mobilEcho enables organizations to wipe only company data off employees’ mobile devices, leaving the employee’s personal data untouched. We also hear how GroupLogic is helping telecommunications firms increase revenue by adding value to their customers’ telecommunications experience, and we gain insight into the DNA of the company as a software provider for over 20 years. Joshua: Why is additional mobile device management needed in file-sync-and-share management, e.g can’t a customer wipe a device using Microsoft Activesync? Anders: A lot of the time it boils down to who bought the device. So if I bought the device and I bring it to work, I’m probably not going to be all that thrilled with the idea that work could wipe everything off of it. So what we do is we focus on providing secure access to content that belongs to the organization. And therefore the organization has the right to wipe that information off of the device regardless if the organization purchased it on behalf of the employee, or the employee purchased it themselves. That’s the idea. Joshua: IT leadership at your customers may eliminate corporate data without disrupting employee personal devices? Anders: Yeah. So that whole BYOD [bring your own device] trend_or consumerization trend or whatever buzzword you want to put in there_this actually really helps that. Because we just wipe the data that’s associated with mobilEcho.
    [Show full text]